You are on page 1of 123
Complete Book® Io ® Engineering Students ———— Educating People As Per, New, a —a CBG igi ation Pa apers Cor pletely Solved “a Vill Semester Cloud Computing Accurate | Comprehensive Nper NIST. Claud computing reference mode! Moveonments, Cloud serces requirements, Cloud re, Cloud Adoption and rudiments i nrasrvcture, C1oud Adopt ty rss cet ace Cgrssin at rays at mage Better, Sosa Newonro eg ‘loud Computfy Arcitectue, Cloud Solutions, lous Tterence Model. Types of Clouds, Cloud Itroperbiy & Sra, Seaabity and Fou Tolerance an Patccaeysiom, Cloud Gusiness Process Management, Cloud (04 ‘Senice Management =~ leet anayin Testing Under Cont, Ytual Desktop Inrastructe, [UNIT :Cloud Management & Virtualization Technology RReslioncy, Provisioning, Asset management Keencers of Map reduce, Cloud Governance, High Availity and Dicastor Recovery w= Witustizction Fundamental concepts of compute, storage, peeking, desktop and application virtualization, Virtualization benefits ovo ‘Server virtualization, Block anc ste a0. Te lovel storage virualzabon Hyporvisor menagement software, Infrastuct MaILAN (MAN and Vitual SAN (YSAN) and their bone --(108 218 LUNIA: Cloud Sec sty: a ‘Cloud information security fundamentals, Cioud security service Dosign Prinaples, Secure Cloud Sofware Requirements Policy implementation, Clous Computing Security Chel Vitualzation secunly Managoment Cloud Computing Secunty Architecture UNIT : Advanced Cloud Computing and Case Studios: Market Based Menagemant of Clouds, Federated Clouds/ntor Cloud rizaon & Definition, Cloud Federation Stack, Third Party ‘Sonics (me? Gael 6 cure ‘croooh Azure, Hadoop, Amazon. z dew (este 9 ‘CHARACTE! “CLOUD COMPUTING REFERENCE Wrest campus (RGR, Dz 05 re tector cloud compting refers tthe means of providing any aad a echnology from computing power computing infasisetae ali "and personal collaboration 10 end users 38 8 spplications, business processes $rhice when they require it rca cloud in cloud computing means the set of software, hardWate, netwoita arage, services, and Interfaces that combine to provide aspeets ‘of computing asa service. definition given by American National Institute of Standards and Technology (NIST) is as follows ‘Clout computing is a model fr enabling convenient, on-demand network: access 10 shared poo! of configurable computing resources (for example rtemorks, servers, storage, applications, and services) that ean Be rapidly ment effort o service provider sed with minimal man A single acca of conceln in cloud computing is undoubtedly be privaey and security. When your data travels over and ress on sytem tha tS BD Tonger under your control, you have increase risk Jue to the interception ad, malfeasance of others, You can't count on a cloud provider maining HE Privacy in the face of government ations IRGRN, June 2017 (BEN Ans, Currently, mobile computing become more opular ds 1 $55 progress in low-power embedded hardware plaforms, System cannot high computational demanding task because of mite storage a capacity. Cloud is the best solution for this problem. Cloud, 0.2, What are cloudless? in cloud computing are 35 Follows — | Mainframes ~ The frst examples of large co uf presen nt seminal for larg dat movement and extreme 1 Tiled by larg companies to process bulk data tte patie wl ctor none a large amount of data, However, mainframes cannot te ante jet they were providing great computational preg eal ofall procesor, which wer inroduced a: single ny in application of maintfanes was the batch processing. () Clusters ~A low-cost alleraive 0 the use of in technology for paral! and high performance computing by stating tow 1980s. They were cheaper compared to main ffames, and proved hig ‘erformance computing ts lrge number of erups, incliding univers a all escach labs. Cluster technology helped 10 the evolution of ad Fameworcfor distributed computing a ew of them ace paral! vt ache {PVM condor, message passing interface (MPI. The computational powcr emmy machines was one o th tative features of cluster th coal leveriged to sole problems manageable only on costly supercomputer (6) Grid Computing ~ As an evolution of cise computing ‘gid computing was introduced inthe carly 90s. Grid computing intodbets new approach o aces extreme compuitional power, ge storage ais And ange of services. Users can se resources similar ther uti ig ower, as and watery means of teme connection, rds intl dean ‘sagareations of geographically dispersed clusters, A computing gid mit Aypamic agreation of hetrogencous computing oes Gi) Virtualization ~ Another important technology for sll computing is vrwalizaton. Vitalicaton includes a collection of slain permitng the abstraction of some of the basic clement for computing It Thardware, runtime environment, nctworking, and storage. This tech) permits cretion of different computing envitonments. These environ dre called as virtua, snc they simulate he interface thats hoped by 3 BH Hardware vrtwaication isthe most conxnon example of vswazation- M4 vchnology permits simulating the hardware interface required by an opraing ce en cna Ft ieee ee ag sora toa Treo arteens aees ra Tae Windows Azure and Google Appengine, this approach ised free nec nant on the concept of services as primary building blocks‘ ing provides and difses two He provies and diffises tw pon, Bled teheas ere eis ron-fncioa serbats evsons ty oon ieee races al between Service LevelAgreement(SLA)thatdccrninecte a8 for the QoS attributes. inesthe minim Espen wv evry od ete pte Se ction a eT soit iielreaet Sead conpln upgrades This sofware delivery mode spose Meevoomis of cate are reiched withthe help of mulitenancy, = BN red Compote 4 ison of conning Soe sptcsions aed neseurure we uel erent ced wey orroene ee Nee etiy ike nr ge voce poweren cal See aiyncay wih he ore coud compe (GA Whats sree ened computing? GP Jae 215 CO as fei © 3) (G5. hein computing? Expein wih ecempe "mar fe 2015 (CM irs Ref © 03 6 Diferenae trmcen dsr computing and onl comping WP, De 201 (Ed vlad emit “Ans Te diflerence between distributed computins below — Cloud Computing Distributed Compusing is wel Distributed computing Eom rises of maliple software com ponents that belong to multiple computers. The system works Jor runs as 2 single system. [Cloud computing is to define a new last a] Jeomputing that is based a network technology [computing takes pace ove arses ferent machines forthe oman jb at same ine Tecmoogies such a ee procedure call and remote Trthed invocation are sed 1 const dstbued compas (7 What are the proper of cloud computing ? TRGPN, June 2016 (BE) ans The propstie of cloud camputiog are rapid east, messed serviceon demand serie, gis network seal lation independent resource polis (8. Wha isa benefit of lod computing over waditional computing ? RGR, Dee. 2014 (CO or Whet are the benefits of adopting cloud computing ? List some of ‘hem, TRGPS, June 2015 (MCA) or Discus the benefits of cloud adoption and rudiments RGR June 2016 (BED) Ans Benes by adopting cloud computing ares flOWS = (i) Availabilty of Resource ~ One of mos gener aang 8 faite virtualization estar aval Abo, resource ali BSS to leverage and tack resource pool under the same ube of sous ns i) Hosted Tools By using sted ols, the deveopsrsand an simply login wo the tools and we the services ove the these tool the tester and developers need atu, ins comigat (0) Operating Efficiency — Sometimes development fee senrecion and cstprecon behaviour tobe different from the desired one also the delay fe epic band pn oe fn ih hon a configurable applications and operating system. This. 2 “Beta oundenand te ernment beter NS D9 Dehe con comping. What are tx advaioes? How dang maps RGR, Dee 201 oe WO ps Rees 9 Q1 ad QS @.18. Discus the vison of cloud computing. [R.GEV; June 2016 Bey “Ans. Cloud computing permits anybody having a credit card to provi inal hardware, runtime environments, and services. The transformation the whole stack is done into a collection of utilities, which canbe peovisiond and composed together o deploy systems in hous, instead of days. Now, ht Opportunity has become a practice across a number of application doris and busines sectors. The demand has improved the set of services offer an fst tracked the technical development ‘The usage of cloud computing is limited toa single servioe at time or ast if services provided by the same vendor. It is hard to move hosted servis fom one vendor to anther due 10 lack of effective standardization eff he long term vision of cloud computing means that IT services are traded ities in an open market having no technological and legal barriers. Coud vice providers and consumers playa central roe inthis cloud market pla exist many technological elements contributing to this vision. Fore services, different stakeholders leverage clouds. The most coms consider cloud computing is the requirement for ubiquitous Sorat spower on demand. One of the appealing factors for end-users 8 ity of web-based access to documents and their processing wit ‘cam ad (il. Describe the hares of oud computing extranet. RGR Dec 2013 (BEE or What are the essential characterises of clowd computing? TRGPN, Dee 2018 (BE inthe characteristics of cloud computing, IGP, De 2015 CA or cus the characteris of oud computing. (RGR, De. 2016 (BE ‘Or ‘Lit and describe the main characteristic of cloud computing stems TRGPN, June 2017 (BEE on List the main characteristics of NIST cloud computing reference architecture TRGRY, Dec. 2017 (MCA What are the characteristics of loud computing as per NIST ? TRGPN, May 2018 (MCA) or Explain differen key characteristics of cloud computing. TRGEN May 2019 (CA) Ans. The following characteristics differentiate cloud ffom any othe «oud computing techniques (Rapid Elasticity ~ Capabiites can be elastically oF rai ‘provisioned. Capabilities an beaded othe system by ier sealing st fr caling up systems. In some cases, scaling may be manval or atoms the consumer the cloud computing capabilites availabe fo proisioning fe appear tobe unlimited and can be parsed in amy gaat at any RES (ii) Measured Service ~ Cloud systems automatically coal 3 ‘optimize resource use through leveraging 3 — Service ~ A consume can prov sage and server tne, a needed human interaction with cach cloud service pon service nthe clo, we ate (iqnons Nework dccess-Resoucesin beckett contables weigh ws Inadtionspplxion deroyele- remo Racer through standard cthods nse ste wo many fea coneared © Gee eet comer thi oe thick chen patton ee Say ctor ce es ae erie acer Ponting ting int ON Leet yur apteien mans oe moto {computing eSources are pooled together in gp rapt cb computing my nl Be the beet model for sos, Howewes clad Noserve mulipecusomers wing» mut-tnant model. Virtua ang gp “eapaingapeation eel ages processing sk Tesoucesae dynamically assigned or essignedon demand Theripq ged" In agin, cow computing a ales ae a the nent ft tocaton independence In tat the customer generaly has tno i Aowlae over exact cation ofthe provided rsours bur may ctl unten tf in re for communicton Sune S88 to specify location a higher level of abstraction. Examples of bea sarbued se. | a ealaeteheesermersem tb filles Sherconcem is pivcy and secur: When dts wvelng vera SD sexing an yen th sen loge onder ou cot, ee eee 012. Whats cloud computing ? Discuss the characteristic of dy" He ees sm maaan tO computing as per NIST. (RGR, Dec. 2017 by 44 Computing ~ There are severa imitations of or cloo computing a given below Define loud computing, Enlist and explain essential characersicy (i). Network Conmecon Network connection sould be ible etcomotier “TROP Jane 20 (Bsn ie. rem nvr comes il fe he ei a or {ud Upload and download speeds are slower a compared 0 tha of & Whats clod computing? Esplain the two important features fad W850: computing. 1R.GPK, May 219 (BE (ip Control of Data Security ~The client data does wat ee in uli cloud because lent cannot conta scanty of is data, Hacker ea Ape Rater 00.1 and O21 “fect the client data by hacking or phishing attacks in cloud. Malware cam (Q.13. What best describes the “metered service” characteristic of das spread i cloud becuse al serves are connect wo each ote in lou computing ? TRGRY, Dec. 2014 (MCA) (iy Addidonat Costs ~ Cloud computing fers many cost benefits or ether are some hen o adional costs. Chen hs to pay ex fo ata Which cloud computing capability enables monitoring and reporih ranser and other services. resource usage? IRGEN., Dec. 2014 (MCA) or What do you undersand by measured services, explain with an example! TRGRY, June 2015 ( Ans, Refer to Q.11 (i). (Gv) Peripherals ~ Printers and scanners donot work with loud Many devices requires software o be instal locally to work en loud (0) Imegration nesting tena aplcions wih hate toed sree and any ine oes ot posible (+i) Genere Puc shoud provides very enrcand mena (O.14, Which cloud computing characteristic enables consumers WEA, sence So any erga ot comforae With KOE d shrink the demand for resources dynamical ? impleotton ey ela o9s nr aces on TRGBY, Dec. 2014 (MOM it large, Nee Refer to 0.11 (v). bn sen fefhacirs Ginaane fe) apc! ado Pros — Refer © Q8. Gone 018, ee pei, mr nd demer of clo torage TRGnY, De so “Ans. There are various cloud storage provider. And continu 2 alg pr ae we we wine oe ight cloud storge provider 25 (Dropbox (Google Drive (i) Mega iv) OneDrve (9) iCloud (0) Box (il) NextCloud (si) SpiderOak Merits ~ {i) Data is store on the web in cloud. ey cvng as sone vi Mob rod songs pois proctn of you dna on Se It youre dann ct (0) Levenpngsandio anton, ean esto expense eet {Sone clou srg rovie provides ied nv (Gi) Cannot access our data without intemet connection, (Ber cmnet cool cry of ur aa in lou (iv) User should copy and paste instead of drag/drop of our data — epapeniom pears | (o) If er wes dng tod doy epi o move ow dan in srage folder. User losses his data from his personal machine, : Tefernce motel RGR, May 2018 (MCA) Define coud reference mode. IRGRY, May 2019 CA] aac capability o deliver on demand a rage of serves bic can ofcoed sompting Thisrange of TT serve provides dsint cman what Goad competing umons we, Coul computing eves ree ed in thre etegois Infrae a--Service (a8) ce cee Service (Pa), and Software-s--Sevice (S85). Fig 13 afr onaip among these categories and provides an oganic We erg computing Ths dagram is refered to as cloud computing reference Tis model shows layered view of rang of cloud computing Sees ‘Tan iow wall the computing stack fom botom to op. aa EERSTE comm ts Sere and Facto Enon acon EC 8, ro ond Ril “Fig. 13 Cloud Computing Reference Medel Infiastrcture-a.-Service solutions provide infasritrs 0 in the form of vial hardware, soap, and networking atthe BE een ee ea Bechet tu Sea oe yr SE Ieper eee vod tao Sa Get tepeinont verge, The lc n+ high level anes (atten instead offi, Te collection of services is idenincg TRemorking, Thee sevices manage the networking among ana? Bcc pres ed Me ceiyn ten Perens Soves vhs povided arcane cvtoanetson dean abe > are ‘ore midlewar lator crests the abstract enviroment for deploys ‘Stenting applicauons, The service provider responsible forofing sgt | rece atest amen ree talon oe we op of cacti Be a ce cect Te Sas ger sr aeencad ett Tae ise ur iota perpeseesty tc rca I egy we ci oping om Pe secreptecrpececicspeesiretenent erect ranl a inne ring cel Ie cat cet emit ie sorce mests aot mer Dee 37 ote Mas Refer) a8 18 (0.20, Explain the cloud deployment models andthe diferent lens cloud computing. TRGRN, June 2015 (MCA, As ero Q.18 (Ua and Q.18, cLOUD Ct ENVIRONMENTS, CLOUD SERVICES a D AND DYNAMIC INFRASTRUCTURE) | ADOPTION AND RUDIMENTS 10.21. What makes cloud computing so interesting to IT stake halt ? Explain it by lis esental cloud competi d research practitioners vironment and cloud service requirements. [R.GI, Dec. 2014 (8 or Tuvandy eee FF coe ad comes Ha ay of comet emt iy vittro mh thy eee se aoe Tet ene ed er whe es aes Sate, feo comping cn lp 08 Sol es wy Redacing Risks Eau th ih evel sec nd elieney eros al ses at and PGES Ii Doing More with Less ~ Reduce capita expends an eral expense. iy rcaihrough Agi nese sity wo guy deliver sow scvcest cae onopporeie whe conning oasand manag vio) Mighr Quay Series grove quality of service on delve ew sees that help the Busines ro and ede Os ‘Good scsics wy ae delivered in ser edly manner and fed cots apceencd ele. The pment nodes u-forwhat jus and uu eliminating the teed for Inger cont and an up fat Ths preset ss drupe bien opportuni fr bases vripaniy or unpredictable F demands, they arabe sly provision ‘Rie amt of eourss on a moments notice and lea them back Toth cd just squishy Following are the ome eso fo adpang te (Pay peruse (@)_No hardware o software wo asta (i) No longterm commiznents (is) Massive, Webscale asad instruct (0) Dynamic allocation, sealing, movement of apliions This ein busitess and T aligned benefits ~ i) Lover IT bares to launch new basis services iy Provide an festive and creative service delivery mode (icc inovation projet that can ed 0 86 EERE iv) Deliver serves in a less cosy and highs ality Business od, while providing serie acess big 1) Rapidly deploy applications ove the Init nd eves BE technologies to services when whee and how your eens wate bs Your eampetitrs do Beles cl cle! conpetnn evrenmene 3 eee foe creation of laos and itera ‘ompuring Services “eterna (Applicaton Development — hopicsions ing i take aranage on east of dyamicall cling on een onl fas benefit om tis feature is Wes og tig tern re dorms affects ne proree Bo tpeal er Web 20 technologies, the Wed has become « plates Re tees onc ime channel or sevice Sea Re Trem applications are scrsble to nestle eau Ferran service Ceployment or varity in workload. amcsinensiv applications represent anther cla of spa Getcntlesipcan advantage by ving cloud computing Theses sa Perceive or datrimensive applications In bh sik «sxe Certaroftesouccs is nededofish execution na reasonable tine me FRtote thr no ned of huge amount f resources constant eft ‘ong draion “The saan for on demand and dynamic scaling i feed by dad computing the le sackfcomputing his scbaned ty) ma tine environmen designed fr sealbility and dyaic sing) oe fethode fr ening comple power, srage, and networking nd) i pplication ervies that imitate the bchavior of deskop applications ba tol bse and managed onthe provider sie. All hse copa teres renin, which emt an cay inteption ino avaiable ems (i) Infstructare and System Development ~The core tech enabling the provisioning of cloud services from anywhere in the globe at frmed by drbuted computing service orientation, viuaizaon a 20. In is required to have knowledge ofall these techniques 10 de eed porter that uso the cloud. are dlr, mana ‘epoyment ace frmed ty Web? 0 ehnologies, Clo comps SS Tra provisioned rough tertice From PE dene psec become th ey accent pot ce SO Po ee cemice anton the wnderysng pardim ha en rr gomputing sytem architecture Peo er clement playing a fundamental role in coud comesting “ina ete,Viatzton cre feature of the nants i By ener Clo appstons developer shoudl be war te eons Spinel virtualization technology (025. Define cloud services. tas Any Web-based application or service offered via cloud someting scaled a coud sence, Cloud services can include anything trom eakndae ha contact applications to word processing and presentations (0.26. What is cloud ? Explain ix features, services and deployment model IRGPS, June 2017 (MCA), Now 2018 (BE “Ans. Refer 9 Q.1, QL, Q25 and QL, (0.27, What are the advantages of cloud service Ans. the user's PC crashes host application and document bat emai ‘unaffected in the cloud. An individual user can access applications and! ‘documents from any logation on any PC. Because documen are hosted it the loud, multiple wers can collaborate oa the same document in real ine, ‘sing any available Intemet connection, Decuments are not machine sents 0.28. Discuss cloud services requiremens. Ans. Cloud computing vendors provide point-salution and produit offerings. On the other band, ne should provide eomprebensis solutions to deploy dynamic nfastructure, which speeded fra model. These services ae designed o provide business Outputs tomation in bedded with coy nll ‘dang se oy ee monmvesmenenea mo nvsiment RO ly ens should begin witha yaa onl in ae support companies pan the very model Claws land development ofa cloud adap and ret ty worload are specific tsstance. hens, Blaningconslingcsssenent ond 029. Discuss she environment and service computing. As. Refer to Q.24 and 0.28 030. Explain the diferent loud sericesrequremens TGP: Ine 206 Ars Major ld services requirement ae as fons eh © Security The resource pooling characteristics of el computing permis users wo dynamically shar physica nd vital roa Highsecurity concerns ae usally associated wth virus env tone va) ude vital component ike hyperisior or running viru machine ual environment for vieual machines communications Aa oma that contain its own IT components init premises can apply and mat oper security polices and contol especially for dentty manage. A ren itis poy w choose a clo service which spats sual ad Adequate access contol an authentication mechanisms (@) Privacy ~ Organizations are often uncerain when it comes ‘managing and storing sensitive infomation inthe cow. Privacy a0 npr issue to be addressed in the direction of raising user rst inthe clot computing paradigm. The geographic locaton of data stored i aco environments usually not revealed wo ses Thi ack of tanspar 88 high concerns especial that privacy regulations and polices ifs oma county to another, (i) Availabilty Most organization ned maximum valli 68 their computing resources provided bythe cloud services. Cloud Seve ave recently experienced failures resulting from several factors inclu eurity attacks, natural disasters and infrastructure outages. Cloud comput ven acantto changes neni ~ Cla ompting sevice provides sho eae sere tat ow a eterpibe 1 GBI ff eg ctngesin te als costar demands nd bal hs Pie ing Archiving provider ong tern storage fa as 0 et Keprg wines dt spas ON SRE require adstioal back Jlmpones some atonal ex ry chan aching aur andes lou compe cuca rune ft many orion ra erably — Chow scaly one of he mos ipa veo clad serves, isin enabled by DESNG ‘ecto ay and mer of T eures " Ba: cloud and dynamic infrastructure. 031 Eakins - [R.GRM, Dec. 2014 (BE dima Chients can access standardized IT resources through cloud a cap acw aplication, vices computing sores fs car ee ter eines herefre making mame ‘oul dynamic infasractre depends onan architecture tht contains enn) _dsset Management ~ Provide maximum valve of important sine nd TT assets over ther ie cycle wth industry tailored asset i) Service Management ~ Acros lhe busines and TSE ifr vist, contol and automation to give higher valu servis (ii) Virwatzation and Consolidation —Decrsse operating cs enhance responsiveness and fll use resource, (Gs). Energy Efficiency ~ Acros the business ad TT nat desl with envionment ner) ad sunainabiity challenges and oppor nesses ob (0) Information Infrastructure ~ Suppor bs objectives like information compliance avail retention and sec ‘Resilience ~ While quickly changing ad responding 1 and opportunites, handle continuous business and TT operons i) Security ~ Offer end-to-end industry customized Eovera rik management and compliance for business, eed ee requis any supporto manage the resources Con Users uses this console to add a server ga oto Mo not require a permitted system administrator ty ma and eolsoration portal because 3 nontechnical _ Berwin ie These terplas ae obit by users fone ed ffeloud services. Pre-defined configuration included in these appt, pete cofigerin ine by tar for configure te ech aa {iets ei information for setup rex oe tects tomplne mater to move the applications among cage get Clned scene portal Devcloper may crest clogs ote through ond templates. Templates also describe about how ten tention on diferent patio like coud Based on VNtwar ont = Mare or Ama, 0.5, Diseuss the different riers of cloud computing. IRGRY, Dec. 201 on "4 Describe the various barrier of cloud computing in brief [RGR June 2015 (04 or Discs he problems associated with cloud computing 1R.GPY, Dec, 2016 (BE) Ans. Soe tajor bares identified by IT organizations tole sat dopin of cloud services areas follows Security - Secwtyconcers ae similar to rations ener and network ina eloud environment. The overall security sks @ perecived as higher or loud services since most ofthe information exchank between the clod service provider andthe organization is done ove the We ora shared network, and because IT security is entirely handled by an ext entity, Some additonal factors cited as contribating to this percepna at limited capabilites for monitoring acess o applications hosted in the coo belief that malt-enant platforms are inherently less secure than single ‘E08 platorms limited knowledge of the physical location of stored date a is of viruaization asthe underlying technology, where virtualization 84 relatively new technology, face ks Intrrvcure vendostulas he cence ang) Sires toes ey ae Fee i cpeioeretanontenmen bo | ery Governance and Regulatory Compliance — Lar eae: ros eee en fr coud esices Foran orzo ay oer pea ce i nee mn a alae et eae Sra a ae ee a can Se Sot mini te event ofan tae. Another sue the inability 0 inves Soe ec ee ce ee Soro ma Te a Sree on roe —— eer pa Iasrae the cloud adoption. [R.GRY, Dee. 2017 (BEY, “Ans. Business functions suitable to cloud deployment are low-pHOHtY busines plications, frnstance, busines intligence against nage tbs, puerfacing project sites, and other low-prinity services. Cloud supports tratonal Web applications and interactive aplication that consis of one than one data sources and services and services with low availability requirements and smaller life spans, for instance, enterprise marking campaigns require rapid delivery of « promotion that can Be tuned of immediately. Its also useful if igh volume, low cost anales and dias recovery scenarios, aes etna are needed igh lod. The bestexanples of ous —aarrear tht roquire diferent eel of infastuctre thr have seasonal demand, ik those used during he, _ ner lose o ding a hliay shopping rason, Uecaion Engine te bass of polices ha tangament (DRM) Aas Tesco er sora wd cr bine 17 ues 8 eanaction proesing and applications relying on important dy of feed i Dynamic Reso company ordemaningabigh vel of axiabity and ac reat od len DRO a mcs eS Se econ AT plies are applied in two cases () when Beccary Sve das, pony ee ee eg aa wi cron aking lage 20040 of Memory. cael ee edngen be merce: a ee a apictn iostentormuneceal NT cc rccnm nea Re regent incon aa ca Mipmtteetet or aplicain ht lbh cos ore alpeeeenataaiieael | Te icant arden perc ve ogee ‘Sng vray on se ene cso nl een ht etisalat Sones Teas 35 at ier eh ie elt | te a al a cory ad ce ceachigeive! cps ot ry cnd= 1) "a ey tty eon aod upline a is RRR Sf tem einen te eyo tg tatetion manage py ove pos th 36 Mr efi ee proved cc ee one nce venir Mo The esa wn Meeclivende sore cpus fom mtn exis Ty") Eau opty et ere ee information is aggregated ino a central logical view of all resources ia (a) Provide selservce portal and hence make sure MM i es iene oa! ae Fmt Srias-Clnt ulcers Dai i, SLA nil cae YS feces pcg ofmachine epoca sofware mages hsp oe ol Dbyresouroe consumers. The range of applications is from individual mang ti) ‘Tal and enor configuration ests an be Patol os a pie provisioned with an operating system image through ofall mutter pre ()- Flexibility and calaility permit promise of unimie TT services on demand 1 datacenter cam be shared poate loud and ths demand can Be vice Porte cloud scsi erable sl Sic SE ima TT involvement (i) Sel ‘o)_ Reporting and Accouning ~ Metering ifrmation on sou Tk in age gathered nan accounting Gb cloud oon enterprise? omens that comprise collections of machines and software at provisioned in a paicular order with network and storage depend (i) The resoures avaiable im ip Media Industry ee ere. acerca sono —— : Ta fox pri besos ny 1a |resources, In addition, they tend to be more organic by growing is aa © (0) Convenience amd Control -Sinccth sous shred sda ete dem community which operate al the deco va er 0 confit between the onvensnce a O84 White a brief note om coud computing chao PREP, Jane 2015 flow computing a3 fla is known ast Ars The mst impor challenges (© Cul Ieroperabily and Standart siding infarct and aplication The oss of fundamental importance in ower 1 Tl ache ae inrdcing sandra aby bene provide by diferent vendors. One of the pine sa bat samies sdopion of cloud computing a al sages consti Aeasomer an be siopedby vendo ok ost formance the challenge a enhance = Lo. = eet Toateiatona Ent sparc 8% 4 salability and ae pore ne eee Sree en So cof sin he Pi waa Nee ae ive and eaincaance Coa, Thess Sa Ca en cotonen io mamas See, oon gle feos eetent and optinzed system. Hee, signing igh ve ib Tras, Privacy end Securiy- For siopin aa ut icy and ‘Reve ineration and data tampering. the comvenbonal (Giogestre wed. The creme we of Vinialianton laa (beeing system to now threats. Foe sstance, i mht Be data, such information eat be Kept ihn the most advanced technology in ‘erate conde sa. This data has be ses Iie appicston when pr Atel othe viru machine man cloud ean offer the pana these ndstns con a advantages of community clouds + ee the advantages of community coud, - Community clouds reopen stems tee iret soltions can occur byallvatng pea rallevating te en OU acrircoarr oe BE epee em oe sey riding resources and services ” jental Sustainability ~ The community claws, have a smaller carbon foot print because they harnes at Tn addition, they tend 10 be more orzanic by arowing, ofc relationship 10 assist the demand oF te comma Which operates all the decisions vi a collective demoed Hs no conflict between the convenience snd contol 4 brief mote om cloud computing challenges URGP Kane 205 8 Important challenges in cloud computing are s follog Interoperability and Standards ~ service based ie and applications as utilities i known as ‘of fundamental importance in order to fully 28 stindadsand allowing interoperabliy vendors. One of the prime strategie of a consti orp watts 8 the ft leading the path fe eye enone hem The Sea eg mano ag Si tis men ca ee vd Felt Tolerance — Tea et To Te ile Se oc te cles dat to amplement such a capability, The cloud mid ieee range of ind users that depend on the cloud 8 MRE ents td m ce oat ee cctoms an mange een a eiaacew. The rae el a Be eee: cane ce nore ine a eee ot cronies gree Hen ae Sitter. vcs can Onan Bi Tass Prive and Secor - For woptan OE a tae tori Te ts, pracy and security issu sesh information and data tampering, the conventional Isles reused. The extreme use of virtualization technologies Seetitng system fo new threats, For instance, it might Be poss faitiafomation canbe processed by th application hose fronting dats, such information can be kept within a eo fly by employing the most advanced technology in ef Bam med so, This dan has 0 be ase lication when proc Beaton wien p ropa clowdinteraperabiliy r TRGES, Dec. 20 201 4 “4 gw 0.4 (i. steal is There sini iter Thus, there is anced 10 Mremdoeric shuld have the abit tera singin an oine mes, if wd sen Ppprteck wv acenral service running of fb vx important requirements fr cloud & is “vendor lackin” concept? & andar, Aso scuss Open | 2 easiny of aa A oy fonat (OVF) describes applianest al formato be run on any hypervisor A and open speciation fo the pocket Beseemposed ofone oc more virtual machi pee 4 ro on - o cing proves sel ome nen uot spin fn race ch [RGP, Des 2 que fection io oe Fauit Tolerance ~ Rese fa Os pcson application econ eae ich are hcl on ee PO he simplest tak ene = Some major benefits ae — Ela ose ) Vimsalicnion 4 i) Advanced cchnology (iv) Managed cloud Di essged cloud services appronch con increase bisinese eng DAnEh, costefstive scalable way. The cloud model improvestestagt ea ae oe panies tat use 8 managed cloud service pial ace sone ae Bison pot objects. A clout bed relioney seney coe uo recover profs asthe production con ig [RGR Dec. 2013 (CH ale “compliant processes is known as ‘Soha preparation tasks rosin | Write steps for cloud provisioning. “Ams. A service that uses a group of compliant processes process. A group of "The separation of assurance tasks and ng tasks is dane by environment provisioning roles. Pr imewalon avis are decouple fom ruront asi pand procurement by provisioning design. The quality asus lized by the process in preparation for surning ove ctf the customer For the purpose oF hosting. Provides ‘service which stats with a Request for Service (RISE fe advance Wy cemices rors ee teat vc Provisioning — mami Prev nem when they need oe er bile on 2 Pay et cured 1 a ck baie NA ‘Provisionina ‘ne provider et So Pa Se aoevioning— Wi 0 ages resources fror the ‘cloud provic as a yn or reed tN aoe a soe characters of prvi Pens 203 (BE) 205 (BEM The benefits of provisioning: BFS as roach 1o Provisioning i incremental appro se roo me cas th ene eas tos, Benefits of Provisioning futons An Assembly Line APDY main of pice pats he POPES {il) Role layers Performing ‘Ans te collection of intellcetual <2 fpabbtvies and for planning ful automation (i) Abii to Measure 1g8-Hllps the ability 10 deliver tose Gs) Continuous Improver Measresents allows alleviating delays and leaning Sg fener quickly to shorten the deliver ime met establish Enhance work experience guaiy pe ceae the defect rte 0 ese i dy —— cae {eel Obes mens for al platforms Othe beta ie to provisioning tears sandy a evans andreas of 83s, wou a ec tape tintaint tate ales icrotne sane Ferrey bee reesing Wok PS (0 provisonee fas and incor nfrstion sce Fog ea Foner perfor snc & See ait sum vi arcace oe pe oa Fare terest fi sevice ile Sopp 2 aig epg Be ge peramd poicna ney ae Coed ed quay ad sizes ff by he techs ou ph [9 Bae eres rec proviso meh Ge: Dee 2a TE per free oven, a Ip Denote ue pve (Erinn re psn (8) Pepys pie | a ea Niger cores conoong aad eben ilaaton eel of te allostd resource, Tooley merriment, | fe, aching oe pus rman = Bate a my When ee 8 = OM rear pulp ety 9 sore wt she ses nbs rt Moan be ae ae Sr managenct i _ pt apocesina sence a fie enon “onan comone gem THE wana ma a a eh arin inthe coud computing er May 2019 (HCA otf olin Saaemneaa Pago 89 cinlmizations tothe hac’ ee ——— ee : Assume we have five files, and each file i aon ee ay forthe Ts xa 8 or cen ons Of URGPS:, Dec. 2014 (MC, 2015 or 12015 a ot a spt of MapResuce is introduced by Goole. Moped Beier proces bye amount 2c cae nea Twosinl fantone wot open tc companeayet) as re erttetine:intoorcnreconrey aia eattimataenestDetcbud sory rirscscmme DAI", jaecessto data, replicating files and finally moving the ‘Galt, 33 ee ct acted nym oy eekea] et le rernch at san crs icc a) marae cote ey Se ame erie srrnns comma nme ee a te cee ise eal Neral vn), eee Ne be Me system, and developers have only to menige — diedown sta five map tasks. I ce tasks that eventually aerate ouput daa a iat ze mippedy pariah, The Nap fo ile pss we recon of i od nis digg Tb a nD ee cored ge Pe pl pe a > moe nei Tyrael rh wy i ih ls moe el ae 2 ‘eet eee | — oho ij un a ‘ the see mall He eh ea site ‘im paral wo each Ou Presi ne ies Ree 02s reds ead sig £79 ep Pros o Ma Shp 1 Preset Sip Ran ie se ty eo a Ma Man [Miphednce Compuston Workflow Fig. 2.2 MapReduce Working Process QS. Esplain the architecture of MapReduce in Hadeop Ans. The adoop MapReduce MRI freer shed ‘masietislave architecture, The nsttctre st obTracker and several slave servers (Task Iepresenis a centlized progam tat hes a [Provides an interface infastrctre for jb sm recites on each ofthe slave nodes whe the acta Users submit MapRetuce the pending jobs queue and exces ther (omy tobepoinedout that eter schdules arable below) The JbTracker manage the mip and vss ish eg ts Saale ee gone + score fr _— Pig. 34 Architecture of MapReduces Eventually all the map tasks will be completed, a which p Geetiatler noes the involved TaskTracker’s to proceed wit se Base. Each TaskTracker wil fork + Reduce Tok pare Jv {ead th downloaded file iat is aready sore by kes) nd invoke dee Anti tat assembles the hey and agreaned value srctre nw ‘output le here sone file per reducer node). Each rece ts or mu fissile threaded, and his thread invokes the educe [cy alc tng fither ascending or descending order The ouput of cach rede ay Prien toa trp file in HDFS. When the reducer rsh: processing aig he temp files automaticaly renamed noi ina destination Fle mame ‘Aste MapRedace library is designed to process st amount odie [potently uilizing hundreds oe thousands of rode, the ibay ha bed ovgrscellly handle ay tle scenarios The Task Teacher odes pro ‘Tepor their stats othe JobTracker that oversees the wv jb roge ‘ni ttre cogs ot Faroe foes Mapa ae v ere st wun a le yt whe ee eee Tae mide cea Become heel ee (i ty nse eb as Flume oe re Ines ‘0 te feMapReduce nse inde, tft trea This information sell 0 em dec document an Me Seren ; i xine ing the occurences the sil ar) Revere Weblink Graph ~ rors ack ol te PB eee rcnit maven lik Hes ap sks sm Be Tie paces nr collection of (arg oe) pas ‘ich pe sure. Te ocean Fe tas ed even in eae iby that contin the simi rg a i SSD peti cone oso orm hai (i) Dorit Grep The ep operation aes ie sre Ths operation cad ou 208 A ie octers praia air excemon of opin (ifs To fers psa taco of distro insets wn sued wo expres developer dts Like interlace and characte i uo MapReduce, major expressiveness id ete teed pte te _ Es ft pram snr mn NE pg ete tat oes Ee np me A A tc ee pes wo a Bee Proves fe hates) Mea RS nn Note ive. He ge og te te files, The map function exacts the oe foo sue rote goat . = spore eit of Hive nthe aii i aeelaeepommetaar TRG, De. 215 ay gy Map Reber ere Bea inna a Pane af ie reitions and xenon: of Mephesto ap a bee iia mote Mant Te Haden Be cet oi i anode posses ee arte aon Foe tt Meatpedy Tos ve te loin cen ing Apache Hao The compe group onaya Tomato efllesyster The native compres tao proj namely Ha {by Conger mee oe ks and the channels connecting ry penton om ie eee paces smodification of graph to certain extent and on yi emp ci nn oy as and tools for paralic! proxramming Dyna & Programming environment which a oe sn framework ables to repres. stnibuted comp team processing model (single program mulupe dant jon of UDF. which ae execused avai! the dss Permits Sphere to represent Map ‘Sphere is built ontop ofthe sector reused 19 represent UDF. data sircure which ge of data segment sa sicam. The coletne eae lusng the disuibuted execution of Sphere Process Ee ‘model iss master slave model corto by Ot ST eae none pena a re poo Se ny Te ast introducing a specification for the yan eS oo fap gu ems Co ragoeranc (REV, Dec. 015(MCMN * Lt er and esponsbitin within 2 sabe sees gen he daan owners are responsible forthe a te heir proper business domain. These domain Ce nn rcs win the bs Es —s domain Bat Beare pring sui che of on, These technical roles slong, tee ieae omer iy oobi 8 erwecn IT and business Pee ts eye of Sr ihe vals of service Beer ehicuc 1 the usin nan specs of coud Proms Aes ote service i sieve ee ey IRGEN:, Dec, 2013 (MCAT eae property handle ud governance ot Cloud Spee” and establish cloud-eetre nuity and cost of loud computing (i) Proactive to anticipate and prevent shadow clouds and hat eapone organicaonal iss ‘el la activites eee Raierilte-tyuccenc el Reese othe vane ur as etm Season ea peace orncta ae Non imccey, ce 0, Mya Refer w 0.62. hc — $e Ditton Vand NAS. cay ere The following table describes some of tne key ai 1 <7 ef oh Ties | iar az} : Fon dal sont | oa a SSS ‘ha | a a | aaa storage| Fibre channel or SCS} Ethernet = Apne | Ys eu Perfomate, bp ii, fOnfganto exis, ds _ | kms ety ned | sion he primary Rework. ‘estan 38, | ts nis fe ero roid yh VM os te we deporte Stet Misi oma Ae en iste rns |) fn ih te gm console resi enya | tReet Te steps este wh ety _,: . vs mapped and ve espn 2 ve sch ge wth ther ses of the YM [One seater i fo Ate gee yy igen VM rela powers ade sri ova A gear ti an ants tem is wsed in ISR serving 28a transport mechanisas nee Ong fel een 0 Meco Cay Jatnbuied fle system. Instead, the VMIM only S655 as he 50 Nn eg al gee se ey ed pate ths Micon Sten rece ae mr a pack relics dcelopers fom he compe ate doce 10 694 MBlscond in 98 seconds, The es tees. The system experinces only 165 ms fae] PE ot in ile sim cal for diferent dsb Ble fhe YM is resored atthe desination box. Tis expemeug] AE a aly dsassocates the VMM fom 389 parle versal gation overhead in Ive nsf ots Mb, at ae cman Howser, his decoophng means ha te Se cn cfc Vs ta os 7, Lit wo tes arising during V6 iran meee bemaned wound withthe ther state infrmtion oftiat YM. IRCGPK; Jame 207) ya ration Aig VI sh ini aloe ee ‘Ars. Two sss aisngdcing VM miistion ae rez yng on forwarding mechanisms on te oigeall | Serer tom mobic edirecton mechanisms o ble ete Peed fetard Te The fin suc niin ne MG pat nd cose wh 2 Vac VM mi opera vial machines. Hence whe 0 ME al Pade tc te es. Thi ade can be iin me ee npn tm oie tele of hos he wore the VMs creat sds ich 109 Desinaon Hox Thedesinason host requis costa) Wen ae is cw dint ital MAC ares. The VM a c= fir migaon. Which is very cet, Ash va TP and MAC adresses the comeing | pun, iret a ep eo se wih He ce and desinton macs ofa VM migation a Miron Novinghe memory nts f27ME) msg, sn ed ARP ey fa aot can be apposed i any nomber tM SEM dengue IP ha ve 8m a pte er compuing re mast have to be conse ris ht 08 ante or ce properties n become r xe that cuns predictably and works eae cent oe Software that i tolerant of or resist filers =n unit harm as possible. ecnnarcnssicsor estes tat can harm he sa 1A of nts tt clestvly oer documentary evden of Feng owing om rial actos fom Matin euts ndor bcsr o esods an FS Stamnes sos a au lO Ig 8 eo a ie scl vel Tass cit wich bow mk i) Aton. techno for rotting dan wanniio nd us ord nthe cos emcrcon. The wal earn fora itul pvt serge cm dr amsosgaeah ine while maining te beni co sng Wht arth te primary gol of information ein? (me Dee rms confetti, itr and avilable TAGE, De. 205 WC Betis rir goals of nformatin ssi ae ist iy ~ Confido sss you ta a edpeople. Confido oncrned wie of sts internation The dace benno. out Services So eas To a Hae scape pam 1 ye cos ping a ae or ce cnc abo imp SE See ot Samm pn io dd tors (GPS e280 EAL gree sci veces ta 2016 (8, 2015 BBL rin ervices prove fo forma RGR Joe 3016 BE Me iter clo security serves a a8 A ~ Authentication eles he Icon fein of e's, heres ee Shh ates awn ty ine, Const Aeon ety to a spt cen and ta Pe The computes scm austen he ws Fw ns oh ame se pevsing he pinta Authentication dirs ue efed public aes an independen adit of ay ont sts ny cmplns snd sa sod rcommcrig th fants ase yao DG) S)%em ceopne nda, a {@) Baxkp coat | ow ea sey (0) Das ay pret —— ios may ests a dekpmet oes spp sn sion fhe yrs penn 7 08 Exp te ems (0 Coney (ty aby Rete 9 Q6 dQ (0, 0 Wr rene a load ec design race ina eh so o hears loud sear design rine TGP, May to dod x esp prinps Pree ~ Tis rine resis a of ey ule povided emia PO ine ce het sa imi eee or ny eesig fr he 6 tal tht ae es 0 of be sot sen poe iy meanness shee! ia he coy seni il dpe non het el a AS Inte uy by exper tage WA Be Sip rt hi sine expt open Designo Mey NSh ch ste Mayan ope-sccess tet cto once ele Sr ee DDS ticks may ash cs met het wih eae ee ered ing a 8 is sabe oct and sacks in ing hes an aca ermine fei cm ake a ae ans dere vat wosevel Ans The ee er i a lowing tee very nets a GP may on cp penne ae Cel coming cy on ee ind ems S01 Se fa ad fo al oesing oben a gf Ne ce ee ayo a a A Rieti orn eu a Tn nn Steely cater vis cpa seg nbn | Mp sri fats Dea ANS Se anole een ee ey cer mei fn Bo) ees een nce oe nd nage es ese se _ pcb wtbammmmotnae ei ott ye Sg =i org wns 8 ne Bids eval compen ih whch tenes Mts) patna hepaaaet ed 27 Ente od njomaon sarin fname ning | vag > eeu Ars Refer 96 02.98, 0.0 0 amc ee ce seem, The en culo GG Eh pn fo yin mma | Brno is oe nb ee a ns fc i Nn een BR in! 03 Ft te sc pan rc oy ese pla ees cei ee oe dd Sirois in Moc oa! ion aon sas ay, nar Ny mk | np sent isons ing a Enerpn Rb a ys naan Ths nsec nea oe ashe aah ss cata) Som oy Compl. ® fo sate a tS rag ee eg Em es and pci on folowing sich Policies mandsor. Mos pices belong winisn Informative Pats These smn Besome ira rex ues “ME Bri (G16. What are the coud security 1 provide secur loud computing ewsirnnne TGP, Me ‘Ars Clo szcury service + Wed bse ss solution, Cloud security serie slows erie ? Eplal dific ptag _ | imped Gr specie’ ashen a cetera ase al rer) one of the clo eeunty et administration nd ac 7 ad eporing Fone eee et, 8 HC he eu tos ie reese enc hana vere eet on While Sh iinet a er acund ete i. a BS |e is es peter oF telat" Coren, my (ics ern aes of [Caeser Sere} (Caceres cite] [oaerreters Web De 2013 (CAN tannin on er Come - On ene Pepe ces cn and» wos exam : “nba oor ond epi oio espe or an at exe cet on wie eit awn “eno Be i [Semmes] seal be =| ns eto Set att | Eye ices exist to informiberade | xiv ceil 96 “ ne | ee B16 What are the coud ae fig 4 ee... ae epee scare cd comps cr i ne | two Min: RP, May 29 404 | QI ica erent eres of lw ply implementa. ee oo < Table D9 ACA oe ety ond “AsFooig ee i 8 of soo ply iment ld sect serie slows st (0 Auhenicasioe and sees Conte ~ One of ey (ha entero | | fais ns pn cumple nemo | Sloe stayn pyr cg ca ee _ some inal rex i 4 Scary Ply Mirch Elta 2 jstich as security and resilier t SS Antomation — core xe ofthe clout outa en ey Further ca “a ae ss eating thst clsicy is ma ny eae a and competing power aso n Oe ®) Governance ~ Clow comping repress dam tates cnc ase oma Greed cnet arisen! sorcnane pa these changes, From a Technolgy perros. cial geney fame an ncrease in vit and aug cipabies ri) Logiat Separation A eyo conpung nese computing castle, mening hat omputins pine can erage 9 own iil bated demand. To support ssh smart a ode, secunty soul be provincia mame a aly rete scr configuators suas VLAN wed a and con arly Kvpup th he st ace Nowe ded to achieve logical separation 10 sere youre a fetch as male tenanc. Scalia Peformance Scalaiiy snp oe cary ean potas sn le fyreqirenents volved tanovatne extol ge le maining sgh secs sens tl se desired ets? ness impact yn cai sks 10 oes tore within the Rg esoined» eury-conscous a effective use of Srany [Prelate Sealy pursue and ach ee aertna cue and Psi Screeners es ae onto = Secu, managcment prevents Ba eer, or rage nasuctre components enn a ving in the clad should Be sme aby, nde ‘Mutseniny 1s) User identi managers com 1) Consumer depends co provicer (@) Dats sour and privacy (Resource avai, {@)Mosiorg and reprngo sevice o AG) User aces con! rly, scsi pices sd ranged bye oul eric rvs a | 82, Epi he cloud computing secriychalinges TGP. Dre 204 stand explain various loud compan cary catege en al ; or _——_Es.foe major chateges in scuring cond computing ar, es 215 BL le by hee fon dod computing ct chat Ma, Je 206 on the coud secariy challenges. (RG Now 2088) on scary challenges cond comput Dens ec, ay 20 8 - tl cone poe dat lin Sagres ~The irocene ola tad tans models sities ak = 2 a rere errno par a a epee alt cmneen tment mci nad comping on fe mo 580, ss diet cota oer pte BSE tah cases Ks Tha needs mre aero becase the co Fee eis ec red crninofcasome: The rat ofa gen ne ‘heats This et ines Bebe nos dane: ie Fetoe etna crces by the oie of infact, seis Gece sing convting Soman, with ahuge ck oT espa Fare cou! sence provider services hough i proeses tee (Vrain Foes Virion hey amen or oak epg sieves tects can be achieved tough a PST ofeteice svc ntodices sce worhy ect SS Aesnpeinn fs Asocsing mall servers wihonehestemehs Serica sprints scr, ceasing the ik fees ST tiie ncn same A a far pthc oto sce th pei, ten bing a Antec cnpug Tne sth an een al Oo {Geter uaa ser, he stacer Bhs he oie Protection at Lt (1) Allasems @) Trused comping so measures a inasrucre soe net methods alow consent trae rc tng 1 oma deer ta rom mde Tiowaman es otany compe een ‘aad ets tnown sas fleinepy The inepsy ecg pe smack. Angry Gols (0) Pros is from mains i te ©) Cont ve ppilesvaee tha unaathoracd pee ie ake a Seen by embers ponon (6) Aathenteaton Rel 8 4) Defe rom lntein a Ds oly a hee ts al sb mat ness > en ng ee gu eects w vc wet cn a iy ee ea yon set cei solo ma = ror rotting dl ror Comin es ns ea at Fe ved during transit and at rest. We should ii Ee ae Cd ce Berge nam om ie - sirtaligation security management a ‘ep Dec 2014 (BE), 2015 (MCA mii drs by tation scaly management 2 TGP. ume 2016 (BEE in loud compat. TG Dee 201888) mew seen et TRG, Des 2017 (HE iat ee fete mama yp A) pe etl mene come al ai ent thom cc he nbd Mnecaites iis ee Ce, ‘can cross multiple jurisdiction for ei ncaa eens secensmson momen poet dereined? Sane How ang i peso information (a is transferred gnc errs a = ocd i oa (i Insecure APIs-Crivina OM each, as dectona ony mae vc ft aeraiis inital envionment repens ego 10 any maining {ii Maticions Insiders — Rsk snes Pie ot Paid Goto close hi hing stands ann Sid oa Bp rates gurney | My lng effect 08 s business. Beyond a ata VMs of different security realms. Pease psa sss cold sien tet npin ne ey Rasete oi aoe Pred | acer pes ob et ros vil rials i vii ee stolen credentials, remains st ao the VM. Bssesem oben aces etal cfdotco ne | Amey senses | et hi arto noe 1 On Feenstra ig | ibe ia tense or sing ibe Vom G26. What are the hey privacy concerns inthe cloud? 09 PM Morin ram the Hest — The bos ray ale he VM ‘ee sme | — i loa a shology permit he tans of ar - Ts Pe a way to move data betweea Sune VM teshalagis permit te login fs rip 2 soe ser wove Pe ‘as key manageeer hr a bee Be Fc en econ 1 Ky MDE 4 ct ae connor ema CH, 24 ey, Te ye et a a a o || tag seas bo Pn ng a Explain the cloud computing secur architecture wig, 3 IRGRY, Dee ane oa ee computing secur TRGRY, Dee: 2013 Describe clond computing security architecture RG, am a a Ep Cites pane rite shor note on cloud computing scary archer RGR, Dt 97 or isc the scary archectre in clon evrnment TRAP Dee 207 | ie Tig 42 Cloud Security Archit Plat Explain scary reference archrctre of clo wih ne Seki eccee oe icc ian | ltt te a nn cnfging vital sachns deployed anna stern 0 ra fet io on enya Samson scien sisal ‘information i stored in foreign juris rang hr comes a 7 lal evict eh cn Cone ang ea poviderunérsupcionofieplutniy, nn Foe data protest sd orpance, hs cad pve at teckel apy certictions suing long Ses chan sould undergo a Saemont on Aug Sunda #1081) Sm Organizations Tpe I Aud st nium serv omit ied ones calsted ys oar where es Ine being seo roc maton, hi see yi BE Andre stnoict dstohey er SA 70 hp ai “he msgs ply hed wh a sored mela Isla ae The compliance an ray nels ve bcs Slon’s engageneat with he cow pve i nm — _ ating ste it ee dt Hike ade set a i ise-level Sr hs 2 ih, ee ee dw cd ene od ry and minimize ks © vi andi ory | peti eso cote ei ce cin 0n be norton aE clasifetin sini ed 1 1 aya the wnuhrize Tse ea ofc ea — insist fo mai a a ou marke. An oesniatin mih tho we veld mimic Ibi 1 pret i hee Bots cton om he earhen frn UE mee ec of formation sification 2 ons ome eu eso Insel ——— a FW pas prices of onetime, a (nig ened Dense iret information lascaton crit, AesTtsng crs uy best demise he clas of oe 1 ae 1 te itso’ ae tects ovr te he evencastuion gh he br Aen ciel dase a coals, ary oe eas en, | a” a [Recognize the suitable administrator daa, ‘ 1W Swe te crea fer coin, npr (6) lsh bys ounce thy, {6 Sate ae ect an cern {0 Sate te como dat wit wt ci 1) eben ne Se ter cay oft orm aa (6) Dewop meyers eat 025 Dice he inp of np erminaton Inomaton sedi con evi a drs Elemis yo enya ts Bellas dnd pce Tce we wont os Na todunindy: Bo emasion yx crn scan Fredy easton weeny ro inet rlenenings dd ot fects ousing npn Ts yooh te nm (The elimination faxes psec oan tion ea, (0) Covina oii inn {i The eam of cng conping ope {09 Temeingonr nanan rapist mle bane pay The salty of cypogape Ky it te ate ma esac er ring _ Vy and he Bot i i ting OTE poet flow incness of the protection coat ried actions performed BS a te eft er ccrese he wnat ie ae wed 10 eaance security i SS howi FE ect tmtns- not D apranttine Diwribasion videos, estes and computer coe od a a cn sven el ommanet toes Sp ere Eset Environ eto tc fee fo Era cose ent ie fey taser fn he Secs pot eth poses haps dr Dn of he dia i mpg platorns for Se rol el doe to sever ned spe malware © ego nea dt and hving te code ft sex ection svimentl the cloud provide Howe ny sabes ech ay ofr a attack path inde aban ence, empl ad a ioe ae Ive on foe ante rt case ste eee so Tigre inigsinc and C== ple me su ES i (and oetcreed _,. YPN A ces Atl vant VPN) ioe link between two aS Pe ere porn os ok ews ees oars ar ey eee ao ilies ponvioyot nth acorn ccna Ns Acme we aE Sea Bmore icmeraeeenal | ee Bevan rocco Acone VS ae ‘dresses for remote access into a company’s intr <4 Somme 43 Altes aes soe pp t4 Rene ees VPN Cont ec por e a tm {SP is used by the VPN software recon tat | ere er ah ee oman Pee ings VPN turn! theo the ners shown in ke = 43 Ncontesin | ax i eo po slic acess VPN al eerste VN These VSO | _ Fig 454 Neterkstenerorh VPN Conieation Fe tearrvnen cet sd he nats at St reteece mae anon. ad he ws Bot the tunneling peooct Tn ee a etn et tmtc ea s6 of a VPN. is ny 4 ets where high eel of cur Cs et ‘access protocol (LDAP), LDAP onic a sai lt msc ce een eres ae $1 Sm nc nr ay oar sans oad oh ey ce pra ae 0 x09 Cert Format design elements of Se ‘he implementa coe design mig pre cCITPITUSE ated — mht refers ote geen Bonen eames fy grt Pes Deieigenercns Festi orie ; sod (LI) Procenar—A poet Bet Iie 1 ee ox mca the ect of 6 mE A processor in whic the cones ic nein both he same ppeie EE prminhershennpsChtyshageccsnanene (7 Medtsing erst he cnesution of 0 9 BOE Sra ane non sng CPU yeas ruben (6 diracsing 1 len he execaion of ae ha Penis ine on mie possi scene a ect occ ceca sera enetin ova Seinen onthe flowing ee ewer Chee ag me te fac en rnc sti oes a epee acai et i, ee 1 specifies something Fan gy tx a SON pct 8 mg Inte to Dre =i sien NT Gh cai oe sun ca soma you Fee aon psooed eS, “a Ma a en ne os Tipe 9-1 sects someting yu oe neces oo comes Sogo oan. eS ae cs To cite Passwords Paswords mus te prs dace: JS password (OTP) is exreme'y saci hace Me AatSRE Ts | mC (See Un Pape, 05 (©) Whats social networking tod compuing? Whaer ange fetdindrstigs (See Unie Page 60807 Unit ference architecture, 4 See Unit, Page38,Q3) (b) Whatis cloud interoperability? Explain (See Unit, Page 8,047) Or (a) Explain fault tolerance techniques in cloud computing ‘See Uni, Page ®,Q4) (b) Explain~ () Cloudstandardization (See Unit, Page 8,239) fii) Cloud scalability, (See Unit-lL, Page@,00 on CaS) Ein dw comaing eary .@) Ws {Discus the role of NIST players in sen Unie ) What re federated clos? Explain major ‘Ge What is nerloud Explain architect of ‘Sects o {h) Describe the hey components of Anca pation: Note : (i) Attempt one question fom exh unit (i) Fash unit cary equal marks U 1. (a), Wht makes cloud computing 50 interesting to cach practitioners” Expl by sng ‘svoatent and cloud Sec SERRE (0) Write a trie nots on load adoption aa o 2. (a) List he diferent cloud apa txplain the senanos tuations role aga the term “vinuat d crue (See Unit, Page 1, Qn I ces cron Seng sha r (it) AIT questions ean (ax, 50 words) cary 2 4 marks, part D (Man. 400, (See Unit, Page, Qa) (iy) Except numerical, Derivation, Us WWhatiste need ofvirualizton ” Dacussthearhieame oftypey |, (a) What best descnbes the “mete Micon ewe includ compuing (See Ui Pape 1 Qag)7 aoe oe {o) Winenedinonneberen block an ete so itm? ‘When cloud computing characteristic (See Unie Page AQ snd shrink the demand for resourees dy or ae Pape toon = gh | © MA tt el eee etre |, vin ste eye eel Te ncnpenen 7 Doi the sels 0 fu lr — (ere Unie tN Pap HO) "See {8 Discs en clow ety I agg Univ ns Unica er wasting ow do visual SANS monk 2 {@) What kind of standards and protocols can be sed 8G) 1 SANs wotk?Abo Ineroperbity inaclod edersion? (See UN PME ment Ml or at tema conosco noes ga Explain the conceps of Mapes ° « _ (@) How testing under cloud canbe service based models of cloud computing | (See Un, Pag sit Unitev PAIS 25 (@) Enlist and explain some of the common pitfalls |S. (a) What describes a community cloud model ? oeisecceaes: ‘See Unit Page SseUatLPaar6yqay |p) Wiebe difencebemeen VLAN Sa yaad oo ean by high vai in cloud com ss ae ‘SeeUntttnFettog.qay, on Seu eaget (©) Which indconputnecapbliytiesmonionbgan) |) Wriehedoras tee akan fe resource oage (Seetnnt fae gt ration ta Seu Q (6 pn i dood marae and svi ra (© pin vmseston peor mans ene aa or aad nie S*Useliheage 5. at is characteristic of cloud-optiized storage ? nie ee (See Uni Pagetaygan, f-(@) stand ex varus clad computing scary Gees Q (©) Explain the cloud information security Eee en AE, (Seventh Semester) EXAMINATION, Jone 215 cloud security management mca ‘CLOUD COMPUTING re (€SIT-703) 1 (2) Discuss cloud computing security architecture. a 0) siete dary ae ym» ere Unie Unit (2) What ace the thee diferent levels expressing thee spn ost ae 8) Define clo computing. Enlist and ex cloud eeatoa ee Weichert (See Unit, PageT2, (7 |) Expl macarons te aS (©) How des cloud computing help osc he is et ah apliations and to cut dwn apa expenses “i or 8) Satish gry cles Give ame 8) Wit brief notes on cloud adoption ad lod ramen pany clad seve (Geeta ON ait ORES TO) ABNER iS 7 et ite a brief notes on cloud computing challenges ee (See Unit, Page66,030 a get ee concen oor eee ee ena cae. PEM outs be sn tome Beye nests et ofr | Pimp Bk 100 tel) any ey cay 7 mae ab Drees Doin ol Drege Cnet (©) Whats tly computing” Explain with xa ‘cota (@) What is service oriented computing? (See Unie ERD (6) What do you understand by measured services, explain wa) ‘example? (See Unit Page ng? (@) pnt coul deployment mods nde ieee) conrng Geeta res or Describe the varios baie of cloud computing int (oe Una Unit Pee Qa) 2. (@) Explain hybrid cloud wih an example. (Se Unie Pa (b) What are the benefits of adopting cloud computing ? Tee item (See Uni, Pagesraa, (@) Draw she diagram for cloud econystem ?(See Uniti, Page 1.48) {B Deserbe the sretecure of virwal deskiop infastucte wip diagram. e (See Unie Pages, Q35) [Explain the architecture and working of cloud analytic wit nat, diagram, (See Unit, Page 9,36) Unie (See Unit I, Page8?,Q) . (a) Define resiliency in brief. (b). What isthe need of virtualization ? Explain in brief. (See Unlt-I, Page 106,028) (©) Differentiate between SAN and NAS. (See Unit, Page 132,08) (a) Describe the various steps of live Virtual Machine (VM) migration hhow its performance effects, (See Unit-IIl, Page 133,06) Or What are the primary requirements of the data centre with respest 0 data centre virwalization, explain in detail ? ‘(See Unit-Ill, Page 129,09) (Ex om mah ney or ‘Explain with neat digram cloud computing: el Uni Explain federation cloud in bet « (©) iat are the characterizing features ofthe big dat ‘ Gert, {c) Desbethe cnc of ats Sea ea Pts (o. ia0 te opnaai au cooper ae SeUanrag or Describe the architecte of Hadoop system in detail, (See Unt ¥, Page 20, (i) Answer five questions. In each question Compulon aD paths ache (ii) Al parts ofeach questions are oe attempted at ne (i) All questions cary equal marks, out of which par A (Max. 50 words) cary 2 marks, part € (Max 100; 5 mark, prt D (Max. 400 words) cary 7 marks (iv) Except numerals, Derivation, Design and Unit 1, (a) What ae the essential characteris of cloud Gee (b) Explain the keys steps in implementing cloud Note: applicaianl See ha fo tence ml? Wine oe {€) Exphin cloud busines process manayemeot (See Unie (2) Explain about clout ansytc using suitable cape. (ee Unie ay MsPIGE O55) Ie del aoa viru dst. nee ‘Seen Unies Fee Qs) I ce oo ecisctnecee (See Unit-tth, “2 (b) Whit in brief about block and fle level storage virualinatse™ 29) Yi ey ont oc press eae or Explain vitual LAN (VLAN) and virtual SAN (VSAN) in loys computing, (See Uni, Page 3 UnitV eae (2) How securiy polices are implemented on cloud computing? (b) Discuss the diferent cloud security sevice, (See Unie, Page 139, (@) List few major challenges in securing cloud computing’? (See Unit1V; Page 148,922) (@)_Explainthe cloud computing sscurty architecture using table ack ee (See Unit-1V, Page 14,028) or Explain virtualization security management in cloud computing. (See Unit-V, Page 181,028) Uniev S. (a) List the major features of Google App Engine. ‘(See Unit:¥. Pannen (Answer five questions In each question pan compulsory nd D part has intermal choice i) Apart of each question are tobe aed at {it) All questions catty equal marks, out of which pa A (Max 50 words) cary 2 marks, part € (Max. 100 wor) ee 5 mats, part D (Max. 400 words) cary 7 mas iv) Except numerals, Derivation, Design and Drang (a) Define cloud computing ‘Geert {D> List the characteris of loud computing. (Se Unit Page (6) Explain the varios reasons for adoping the cloud er (@) Give a bret description of cloud computing reference (See or Why organizations are adopting the cloud fe perspective? Explain ‘Geel 41. (a) Differentiate between private and public clouds cat (©) Explain cloud ecosystem. {) Define cloud aplication architec. (See (@) Explain jens oa ees Explain the following ems = (i) Viral desktop infants i te a ; or OU Explain the following terms "ea {) Policy plementation a (ii)_ Virtualization secunit cn ty management 5. (a) Define federated cloud. (Se Un (b) Explain inter cloud, (See Unity, , Me 10 By de ty ot es guy de MG (6 Papin mitt sed mange ot egy Gata or Discuss about the following case studies () Microsoft azure age rane (See Unie Pagan 104) BE (Seventh Semester) EXAMINATION, CLOUD COMPUTING et (csir703) ote (@ Answer five questions. In each question part A, B, Cis compulsory and D part has intemal choi i) All parts ofeach questions are o be attempted a one pas (iil All questions carry equal marks, out of which pat Asa B (Max, $0 words) carry? marks, part C (Max 100 wor) ery 3 marks, part D (Max. 400 words) cary 7 marks (iv) Exceptnumericals, Derivation, Design and Drawing ee. ‘ or Discuss the vision of loud computing? (ee Uni (a) What do you understind by Sass Ge Umea (3) What do you mean by the term Sealabiliy i eam ‘Gee Utell, Page 0,0 (o, Eaplain cloud ference mode saunireaee (9) Woe short notes onthe following — eo (Public coud (a) Private cloud Gi) Hybrd sa ee hans tec sire write down the limitation of cloud computing, i Pi. Cpl bey eco! inter ee cova ‘Ya xt wo maa cio of ond Hes a Canning parc ia do ou nea ya! a a viedo ee oe on tet A eee eh at nati ee. aise Dana in which it is structured. |(Sce Unit-I, Page 46 a Scittne Snape alone aa Deseo oe tied party cloud services inden Mas) (tn agg, % (See Unie, Pgeao, hee, I keno ans sa 5 architecture (See Unit Page gins 2, (a) Discus diferent ways for cloud service provider tonsa paces cee De es ses wean in Ses aaa Ae combenies which provides that service, 18 Egan ‘io Ua ae ti evens wd cionvaaps 9s Meri Cul? oa gan (asain ds cn eg erie ety ed fom th co. ; (Se Unit ops) Diseuss the architecture ofa computer system befoe ae ap (See Unit-IIl, Page 108,Q31)7 virualization. (©) Explain vimuatization suppor and disse storage clouds. (GeeUn ee sance of memory virtualization. + recovery forcomputeant 1, Page 107,030) a. ote a (0) Atemp any five questions, ach qoeion as, (0) Assn sabe dtfemisng. 1. (Wat the charset ld computing as er NSE Set (0) Desert plein: o CRM and ERP in clean (See Unit, Page 33, Q45)_ 2. (4) Discus th ou patos in ECG diana Serle Page) (0) Din stout lod computing farts mela (See Page QI 3. (2) Wea shot ooeon VD wis ms " (Set ee) (0) Esplin clo refence achive inde (See Ut Page.) 4. (a) Watisyimulton? Desi vans pet na (See Unit-IL Page (0) Weieanot onblock ee srg vinaiaonand il virualzation inde {See Unit Page 5. (a) Write detailed noe on hypervisor minagenent as ee 09) ar its rr “etnenops ’ , ae Cle ret ee Unl-¥. Page 176,04) ‘November 2018 Grading System PUTING «BOS Note) Anempt any ive questions. Al)_Allquesions cary equal marks A 46, Brolin te NIST clood computing eerace archiecure (See Uni Page, Whats cloud? Explants features, services and deploynene (See Unit Page 1 Discuss the various available cloud sevies or appieaigey ee (See Unie, Page S3,Q ent (@)_ What are the architectural design challenges ? Explain, 7 Write short notes on ~ 4 (a) Web APIs (b) Web applications (©) Web browsers it, Page 62,931) (2) Briefly explain the different ypes of viualization, 5 (See Unit, Page 112,939 (©) Describe VMware infastrcture in detail 3 Page 4,067) (@) What types of cloud OS are used in virtualization datacenters Explain 7 (©) Explain the cloud security challenges age 148,927 (20) ()_Atempt any ive questions. (ii) Allquestions cary equal marks, 7 ‘deatify NIST cloud computing teference architecture with nea schematic diagram ‘See Unit, Page 39,17 OF st the advantages and disadvantages ofthe series Ot loud (See Unie Pages 3) (oY Explain the applications ofthe cloud computing, " (See Unit Page3. 3 95. Frplain in dei about publ, private and ybrdcloude routine Page 60,.Q29 Explain the uses of 1 Gy, haere pb /Piiars sacar y/ Sottare as nsec (See itt Pages, Expin in dei sbouarchitecr of mp rece endow al aj in kadoop Se Uni, Page 9,10 Discuss the various level of vrualiaon implemen (See Ul, age 2405 Explain the migration of memo fess mtn ae ‘eal (SeeUnietthpage 8430) Explain the fundamental fanctions oad ee EN eee (See Unit Page 12,0) et) “san BLE VII Semen EXAMINATION St 019, en: taaniseath re aay gi) Attempt any five question, Allien at ual mak Ie elo computing ? Explain the wo, ‘What i cloud computing het inp ot nui Seimei ay Fe erairen psf deplymens mata ee ci soi nage 6 Comunen ew Seren oeed Gy Serice Covert ison uaa Mtge {@) Define Virualization ? Why Virualcaton impor gga Explain the chou computing” sit Page) i) CRM aad ERP (a) What are the different techniques used for implemeat 3 maar Vian? Explain he nt i a (©) Whats load balancing ? What ate the advantage balancing? ira b (a) Talea mabe example and exlinthe conse ofan a vel aN covers (@) What do you mean by virtual LAN and vital SAN 2 Wittig hae benefits Page 13,08 7 (2) What are the different security challenges in cloud compas (Gh Fad clemce uel How cloud services are maga? Discuss each in brief (2a) a ys (See it cloud deployment models, (See Unit-n, fone different security issues aries in the cloud ) What are the cloud security services ? Explain dit 4 ‘made to provide secure cloud computing environment Ps (See Unit-y, pa, 1 Pay , 8144.9, a (a) What are the features of Google file system ? (See Unit Vs Pagegs.g 4! 2.3 (b) What do you mean by cloud federation stack ? (See Unit-v, pa, 7 82178, Qi) 7. (a) Explain the role of MAP reduce in the cloud computing, (See Unit-IH, Page 93 Oh Quig) (b) Discuss development facilities in AZURE cloud, (See Unit-V, Page 197 Re 8. pes short notes on any two — Google App Engine (See Unit-y, P; Pay if) Hadoop (See Unit-V, Page = . (iii) VSAN (See Unit-III, Page pee (See Unit-I1, Page 79, ta (iv) Cloud business process management.

You might also like